A new authentication scheme with anonymity for wireless environments

被引:210
作者
Zhu, JM [1 ]
Ma, JF [1 ]
机构
[1] Xidian Univ, Sch Comp, Xian 710071, Peoples R China
关键词
anonymity; authentication; security; wireless network;
D O I
10.1109/TCE.2004.1277867
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless network, is susceptible to security attacks because its openness of transmission media. Wireless network security is somewhat more concentrated and complex than that of wired network. Authentication is the most essential procedure to ensure that the service is properly used. But its limited resource, such as weak power supplies and limited bandwidth, must be taken into account in the design of security schemes. In this paper, we present a new and efficient wireless authentication protocol providing user anonymity. Our scheme is based on the hash function and smart cards, and mobile users only do symmetric encryption and decryption. In our protocol, it takes only one round of message exchange between the mobile user and the visited network, and one round of message exchange between the visited network and the corresponding home network. The most significant feature is one-time use of key between mobile user and visited network. Finally, the performance of our scheme is analyzed(1).
引用
收藏
页码:231 / 235
页数:5
相关论文
共 7 条
  • [1] Survivable mobile phone network architectures: Models and solution methods
    Alevras, D
    Grotschel, M
    Jonas, P
    Paul, U
    Wessaly, R
    [J]. IEEE COMMUNICATIONS MAGAZINE, 1998, 36 (03) : 88 - 93
  • [2] Improving the fault tolerance of GSM networks
    Chang, MF
    Lin, YB
    Su, SC
    [J]. IEEE NETWORK, 1998, 12 (01): : 58 - 63
  • [3] Go J., 2001, SCIS 2001
  • [4] Horn G, 1998, LECT NOTES COMPUT SC, V1485, P277, DOI 10.1007/BFb0055870
  • [5] KRISHNAMURTHY P, 2000, P VTC 2000 BOST MA S
  • [6] Security in wireless communication
    Rahman, MG
    Imai, H
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2002, 22 (02) : 213 - 228
  • [7] Authentication of mobile users in third generation mobile systems
    Tzeng, ZJ
    Tzeng, WG
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2001, 16 (01) : 35 - 50